← Back to all briefings
Infrastructure 6 min read Published Updated Credibility 91/100

Exchange 2016 Extended Support Ends

Exchange Server 2016 leaves extended support on 14 October 2025, ending security updates and pushing customers to Exchange Online or Exchange Server 2019/Subscription for supported mail and calendaring.

Accuracy-reviewed by the editorial team

Infrastructure pillar illustration for Zeph Tech briefings
Infrastructure supply chain and reliability briefings

Microsoft’s lifecycle fact sheet lists as the end of extended support for Exchange Server 2016. Security fixes and daylight-saving updates will stop, and hybrid environments will lose a supported on-premises bridge unless upgraded. If you are affected, complete migrations to Exchange Online or move remaining on-premises workloads to Exchange Server 2019 or the Subscription Edition.

Key risk themes

  • Unpatched mail infrastructure. Post-cutoff CVEs affecting Outlook Web Access, EWS, or transport will not be fixed for 2016.
  • Hybrid supportability. Unsupported hybrid servers can complicate Autodiscover, OAuth, and hybrid modern auth configurations.
  • Compliance and audit. Regulators and auditors expect supported messaging platforms; remaining on 2016 can trigger findings.

Focus areas

  • Migration sequencing. Prioritize mailbox moves to Exchange Online, decommission legacy DAG members, and refresh load balancer and certificate configurations.
  • Server replacement. For on-prem estates, plan Exchange Server 2019 or Subscription Edition deployment with supported Windows Server baselines.
  • Security hardening. Remove legacy auth endpoints, patch to latest CU, and validate backups before decommissioning.

Further reading

Managing Exchange modernization projects with hybrid coexistence plans, certificate hygiene, and decommissioning runbooks.

Cost and resource management

Infrastructure teams should evaluate cost implications and improve resource use:

  • Cost analysis: Assess the cost impact of infrastructure changes, including compute, storage, networking, and licensing. Model costs under different scaling scenarios and traffic patterns.
  • Resource improvement: Right-size resources based on actual use data. Implement auto-scaling policies that balance performance requirements with cost efficiency.
  • Reserved capacity planning: Evaluate opportunities for reserved instances, savings plans, or committed use discounts. Balance reservation commitments against flexibility requirements.
  • Cost allocation: Implement tagging strategies and cost allocation mechanisms to attribute expenses to appropriate business units or projects. Enable chargeback or showback reporting.
  • Budget management: Establish budget thresholds and alerting for infrastructure spending. Implement governance controls to prevent cost overruns from unauthorized provisioning.

Regular cost reviews help identify improvement opportunities and ensure infrastructure investments deliver appropriate business value.

Compliance considerations

Infrastructure security teams should assess and address security implications of this change:

  • Network security: Review network segmentation, firewall rules, and access controls. Ensure traffic patterns align with security policies and zero-trust principles.
  • Identity and access: Evaluate authentication and authorization mechanisms for infrastructure components. Implement least-privilege access and rotate credentials regularly.
  • Encryption standards: Ensure data encryption at rest and in transit meets organizational and regulatory requirements. Manage encryption keys through appropriate key management services.
  • Compliance controls: Verify that infrastructure configurations align with relevant compliance frameworks (SOC 2, PCI-DSS, HIPAA). Document control setups for audit evidence.
  • Vulnerability management: Integrate vulnerability scanning into deployment pipelines. Establish patching schedules and remediation SLAs for infrastructure components.

Security considerations should be integrated throughout the infrastructure lifecycle, from initial design through ongoing operations.

  • Recovery objectives: Define and validate Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) for affected systems. Ensure objectives align with business continuity requirements.
  • Backup strategies: Review backup configurations, schedules, and retention policies. Validate backup integrity through regular restoration tests and document recovery procedures.
  • Failover mechanisms: Test failover procedures for critical components. Ensure automated failover is properly configured and manual procedures are documented for scenarios requiring intervention.
  • Geographic redundancy: Evaluate multi-region or multi-datacenter deployment requirements. Implement data replication and synchronization appropriate for recovery objectives.
  • DR testing: Schedule regular disaster recovery exercises to validate procedures and identify gaps. Document lessons learned and update runbooks based on test results.

Disaster recovery preparedness is essential for maintaining business continuity and meeting organizational resilience requirements.

Assessing infrastructure

Infrastructure teams should conduct full assessments to identify affected systems and focus on remediation based on exposure and criticality. Patch management processes should account for the specific technical requirements and potential compatibility considerations associated with this update. Testing procedures should validate that patches do not introduce operational disruptions before deployment to production environments.

Monitoring should continue post-remediation to verify successful setup and detect any exploitation attempts targeting systems that remain vulnerable during the patching window.

Cumulative update requirements

Exchange 2016 must be current on cumulative updates to maintain support eligibility. Verify CU status and plan updates before initiating migration projects. Some migration tools and hybrid configurations require specific minimum CU levels.

Legacy customizations and third-party integrations may require updates to remain compatible with current cumulative updates. Test updates in non-production environments before production deployment.

Mailbox migration planning

Large mailbox migrations require careful planning for bandwidth, migration endpoints, and user communication. Batch migrations during off-peak hours minimize performance impact. Monitor migration health and address failed mailbox moves promptly.

Public folder and shared mailbox migration

Public folders and shared mailboxes require special handling during migration. Evaluate whether public folders should migrate to Microsoft 365 Groups or shared mailboxes. Document current public folder structure and permissions for accurate recreation in target environment.

Shared mailbox access patterns may change in cloud environments. Review delegation configurations and update access rights as needed during migration.

Integration and connector updates

Third-party applications integrated with Exchange 2016 may require updates for compatibility with target platforms. Audit current integrations including CRM systems, ticketing platforms, and archive solutions. Coordinate with vendors on migration support and compatibility verification.

Hybrid configuration management

Hybrid deployments require ongoing maintenance of both on-premises and cloud components. Plan hybrid management resources and establish clear ownership for configuration changes. Regular hybrid health checks verify continued mail flow and directory synchronization.

Document hybrid architecture and operational procedures for support team reference.

Compliance and audit considerations

Email systems are subject to various regulatory requirements including retention, eDiscovery, and data protection. Verify target platform capabilities meet compliance requirements. Plan retention policy migration and verify search capabilities function correctly post-migration.

Successful migration requires coordination across IT, legal, and business teams.

Thorough planning reduces migration risk and improves outcome quality.

Validate migration success with user acceptance testing before decommissioning legacy systems.

End of Support Impact

Extended support ending for Exchange Server 2016 means no further security updates from Microsoft. Organizations running unsupported versions face compliance violations and increased security risk. Migration planning should prioritize Exchange Online or supported on-premises versions.

Migration Strategies

Hybrid deployments enable phased migration to Exchange Online while maintaining on-premises presence during transition. Cutover migrations suit smaller deployments where parallel operation is unnecessary. Third-party tools assist with complex migrations involving large mailbox counts or legacy integrations.

Security Considerations

Unsupported Exchange servers become attractive targets for attackers. Network segmentation limits exposure while migration proceeds. Enhanced monitoring detects exploitation attempts targeting known vulnerabilities in legacy versions.

Continue in the Infrastructure pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Coverage intelligence

Published
Coverage pillar
Infrastructure
Source credibility
91/100 — high confidence
Topics
Exchange Server 2016 · Messaging lifecycle · Hybrid Exchange
Sources cited
3 sources (docs.microsoft.com, cisecurity.org)
Reading time
6 min

Further reading

  1. Microsoft Exchange Server Lifecycle — microsoft.com
  2. Exchange Server Support — microsoft.com
  3. CIS Microsoft Exchange Benchmark — cisecurity.org
  • Exchange Server 2016
  • Messaging lifecycle
  • Hybrid Exchange
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.